Work Role Description: Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
Work Role Description: Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
Work Role Description: Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
Work Role Description: Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.
Work Role Description: Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Work Role Description: Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.
Work Role Description: Designs, develops, tests, and evaluates information systems throughout the systems development life cycle.
Work Role Description: Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.